Inject Fake Applications And Trojans, Advertising

BitDefender Labs: alleged anti virus products were the top-E-threats in November Holzwickede, December 15, 2008 like BitDefender, a global provider of internationally certified security solutions, announces, fake antivirus products dominated the top ten risk list in November. Variants of the Trojan of FakeAntivirus occupied the positions 1, 2 and 3 of the monthly hazard reports. 37 percent of the top E-threats registered in November accounted for it. Links to these E-threats were scattered through various sources including spam, hidden redirects to dubious websites and malware, which itself had already nestled on computers. \”Current top threats: fake applications and Trojans that will inject advertising running the Trojan FakeAntivirus on a malicious Web page, a lasting about 10 seconds scanning process will start\”.

During this pass, the scanner detects\”an enormous number of infections thousands of malicious files. The names of the found\”viruses are taken from lists by manufacturers of Anti-spyware software are. The fake antivirus program called then\”money for the removal of the found malware. An other dominant E-threat was the Trojan Downloader Wimad is also a fake application last month. To be the Trojan Downloader Wimad pretends an MP3 player or a codec\”. The actual file, it downloads as Adware is one. PlayMP3z called adware, which didn’t make it into the list of the top ten threats, because you was complicated by BitDefender products distribution. Other significant threats of the month were the ranked in 4th place Clicker.CM, which produces advertising.

He has been programmed for the sole purpose, to circumvent the pop-up Blocker from Norton Internet security. His threat level remained constant with 6.2 percent of the infections, that moved in the past three months about 6%. 2.19 percent takes the Trojan.Downloader.JS.Zlob.A\”in November the 9th place of the top-ten-E-threat reports from BitDefender one. A JavScript which followed on 10th position Name Exploit.HTML.Agent.AQ, which exploits a vulnerability of Microsoft products at the VML parsing.